Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2018-15801: CVE-2018-15801 | Security

Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.

CVE
#vulnerability#vmware#auth

All Vulnerability Reports

CVE-2018-15801: Authorization Bypass During JWT Issuer Validation with spring-security
Severity

Low

Vendor

Spring by Pivotal

Description

Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.

Affected VMware Products and Versions

Severity is low unless otherwise noted.

  • Spring Framework 5.1 to 5.1.1

Mitigation

Users of affected versions should apply the following mitigation:

  • 5.1.x users should upgrade to 5.1.2

There are no other mitigation steps necessary.

Credit

This issue was identified and responsibly reported by Björn Bilger.

References

  • Example config where a simple Resource Server is enabled.
  • Spring Security Resource Server Support documentation.

History

2018-12-18: Initial vulnerability report published.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907